John Kindervag

Vice President, Principal Analyst serving Security & Risk PROFESSIONALS

John serves Security & Risk Professionals. He is a leading expert on wireless security, network security, security information management, and PCI data security.

Previous Work Experience

John is a 25-year veteran of the high-tech world. He holds numerous industry certifications, including CISSP, CEH, QSA, and CCNA. Prior to joining Forrester, John was the senior security architect with security consultancy Vigilar, and he started the security practice for a Cisco Gold VAR, Flair Data Systems, where he was a principal security consultant. He has particular expertise in the areas of wireless security, intrusion detection and prevention, and voice over IP hacking. He has been interviewed and published in numerous magazines, including Hospitality Technology Magazine, SecurityFocus.com, and Techtarget.com. John has spoken at many security conferences and events, including ToorCon, ShmoCon, and InfoSec World.

Education

John has a Bachelor of Arts degree in communications from the University of Iowa.

Refine your results

Date Range

Role

Methodology

Industry

Topics

Market Imperatives

Region

Vendor

68 results in Reports

  • John Kindervag
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2015

    Political Instability And Cyberterrorism Raise The Security Stakes For Digital Businesses

    Each winter, Forrester outlines 12 important recommendations for your security strategy for the coming year. We base these recommendations on thousands of client inquiries and interactions,...

    • Downloads: 249
  • For Security & Risk Professionals

    Report:Planning For Failure

    An Effective Incident Management Program Is Essential To Help You Stay In Business

    S&R pros, it's not a question of if — but when — your organization will experience a serious security breach. Cybercriminals are using more sophisticated and targeted attacks to steal...

    • Downloads: 997
  • For Security & Risk Professionals

    Report:TechRadar™: Zero Trust Network Threat Mitigation Technology, Q1 2015

    Road Map: The Security Architecture And Operations Playbook

    Not a week goes by without news of network attacks and stolen data. Consumers routinely undergo the stress of fraudulent charges or compromised credit cards. Digital businesses lose millions in...

    • Downloads: 279
  • For Security & Risk Professionals

    Report:Five Steps To A Zero Trust Network

    Strategic Plan: The Security Architecture And Operations Playbook

    A Zero Trust network abolishes the quaint idea of a "trusted" internal network demarcated by a corporate perimeter. Instead, it recognizes that today's digital businesses must win, serve, and retain...

    • Downloads: 148
  • For Security & Risk Professionals

    Report:Quick Take: The State Of Privacy In The Union

    President Obama Introduces Privacy Initiatives With High Merit But Low Potential

    United States President Barack Obama introduced several proposed privacy initiatives in his 2015 State of the Union address and in preview comments he made to the Federal Trade Commission (FTC) the...

    • Downloads: 70
  • For Security & Risk Professionals

    Report:Rethinking DLP: Introducing The Forrester DLP Maturity Grid

    Assessment Framework: The Data Security And Privacy Playbook

    Data loss prevention or protection (DLP) remains one of the hottest topics and most difficult challenges among S&R executives today. It's a key technology to help prevent the leakage and exfiltration...

    • Downloads: 1637
  • For Security & Risk Professionals

    Report:Understand The Business Impact And Cost Of A Breach

    Business Case: The Security Architecture And Operations Playbook

    We are in the midst of a golden age of hacking. The information security threat landscape is changing rapidly, and security organizations are struggling to keep up with the changing nature,...

    • Downloads: 1284
  • For Security & Risk Professionals

    Report:Know Your Data To Create Actionable Policy

    Policy: The Data Security And Privacy Playbook

    Data defense is the fundamental purpose of information security. To defend your data, there are only four levers you can pull — controlling access, inspecting data usage patterns for abuse,...

    • Downloads: 791
  • For Security & Risk Professionals

    Report:Transform Your Security Architecture And Operations For The Zero Trust Ecosystem

    Landscape: The Security Architecture And Operations Playbook

    Forrester's Zero Trust Model of information security banishes the old security motto of "trust but verify" and replaces it with a new motto: "Verify but never trust." When you're trying to protect...

    • Downloads: 830
  • For Security & Risk Professionals

    Report:Rules Of Engagement: A Call To Action To Automate Breach Response

    Processes: The Security Architecture And Operations Playbook

    It seems that not a day goes by that there isn't another massive security breach in the news. Consumers around the globe hear about continual threats to their personal data while name brand retailers...

    • Downloads: 174
  • For Security & Risk Professionals

    Report:Predictions 2015: Data Security And Privacy Are Competitive Differentiators

    Landscape: The Data Security And Privacy Playbook

    Love him or hate him, Edward Snowden's revelations of widespread National Security Agency (NSA) government surveillance triggered an international discussion and debate on privacy. Suddenly, the...

    • Downloads: 414
  • For Security & Risk Professionals

    Report:No More Chewy Centers: The Zero Trust Model Of Information Security

    Vision: The Security Architecture And Operations Playbook

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For a generation of security and risk (S&R) professionals,...

    • Downloads: 2357
  • For Security & Risk Professionals

    Report:Rethinking Data Discovery And Data Classification

    Strategic Plan: The Data Security And Privacy Playbook

    Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data...

    • Downloads: 722
  • For Security & Risk Professionals

    Report:Develop A Two-Phased DDoS Mitigation Strategy

    Protect Yourself From Hacktivists And Other Cybercriminals

    Until recently, distributed denial of service (DDoS) attacks had been part of infosec lore: something you heard about but rarely experienced. With the rise of hacktivist groups and other...

    • Downloads: 587
  • For Security & Risk Professionals

    Report:Defend Your Data From Cyberthreats With A Zero Trust Network

    Executive Overview: The Security Architecture And Operations Playbook

    We've all heard about the "evolving threat landscape." In biology, evolution is a process that takes millions of years to occur as a result of small changes in successive generations. Mutations, in...

    • Downloads: 831
  • For Security & Risk Professionals

    Report:The Future Of Data Security: A Zero Trust Approach

    Vision: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, and protecting it from theft, misuse, and abuse is the No. 1 responsibility of every S&R leader. Hacked customer data can erase millions in...

    • Downloads: 2511
  • For Security & Risk Professionals

    Report:Protect Your Intellectual Property And Customer Data From Theft And Abuse

    Executive Overview: The Data Security And Privacy Playbook

    Data is the lifeblood of today's digital businesses, but for economic and even political gain, highly skilled cybercriminals and malicious insiders are determined to steal it. Meanwhile, customers...

    • Downloads: 975
  • For Security & Risk Professionals

    Report:Quick Take: Cisco Acquires ThreatGrid, Bolstering Advanced Malware Protection

    Cisco Broadens A Strong Portfolio But Still Needs To Better Explain Its Overall Security Product Road Map

    On May 20, 2014, Cisco Systems announced its intention to acquire privately-held dynamic malware analysis company ThreatGrid for an undisclosed amount. This acquisition enhances Cisco Systems'...

    • Downloads: 95
  • For Security & Risk Professionals

    Report:TechRadar™: Data Security, Q2 2014

    Road Map: The Data Security And Privacy Playbook

    We designed this report to help security and risk (S&R) leaders develop their road map of data security technologies using Forrester's TechRadar methodology. As data volumes explode, it is becoming a...

    • Downloads: 732
  • For Security & Risk Professionals

    Report:Top 15 Trends S&R Pros Should Watch: 2014

    Each year, analysts from across Forrester's security and risk research team draw insight from our hundreds of enterprise questions, vendor briefings, and consultations; the 25-plus research projects...

    • Downloads: 673
  • For Security & Risk Professionals

    Report:Quick Take: Stem The "Heartbleed"

    How To Fix A Broken OpenSSL Implementation And What To Do While Everyone Else Fixes Theirs

    To secure eCommerce, banking, healthcare, and other high-risk transactions, many security pros use the secure socket layer/transport layer security (SSL/TLS) protocol to encrypt sensitive information...

    • Downloads: 394
  • For Security & Risk Professionals

    Report:Quick Take: Palo Alto Networks Acquires Cyvera

    Palo Alto Extends Its Reach To The Endpoint

    On March 24, 2014, Palo Alto Networks announced an agreement to acquire Cyvera, a privately held endpoint security company, for approximately $200 million. With the acquisition, Palo Alto Networks...

    • Downloads: 98
  • For Security & Risk Professionals

    Report:Twelve Recommendations For Your Security Program In 2014

    Customer Trust And Digital Disruption Are Key Considerations For Your 2014 Security Strategy

    Every winter Forrester outlines 12 important recommendations for your security and risk management strategy for the coming year. These recommendations stem from our understanding of the current state...

    • Downloads: 1014
  • For Security & Risk Professionals

    Report:Quick Take: FireEye Acquires Mandiant

    FireEye Emerging As A Leader In A New Breed Of Security Companies

    On January 2, 2014, FireEye announced its acquisition of incident response and forensics specialist Mandiant for nearly $900 million in stock and $100 million in cash. With this acquisition, FireEye...

    • Downloads: 198
  • For Security & Risk Professionals

    Report:Market Overview: Network Segmentation Gateways, Q4 2013

    Because of the increasing demand for Zero Trust networks, Forrester envisions the development of a new product category called a network segmentation gateway, a product category that is much more...

    • Downloads: 439